Discovery of a System Time

Identifies use of various commands to query a systems time. This technique may be used before executing a scheduled task or to discover the time zone of a target system.

Sigma rule (View on GitHub)

 1title: Discovery of a System Time
 2id: b243b280-65fe-48df-ba07-6ddea7646427
 3status: test
 4description: Identifies use of various commands to query a systems time. This technique may be used before executing a scheduled task or to discover the time zone of a target system.
 5references:
 6    - https://eqllib.readthedocs.io/en/latest/analytics/fcdb99c2-ac3c-4bde-b664-4b336329bed2.html
 7    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1124/T1124.md
 8author: E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
 9date: 2019/10/24
10modified: 2022/06/28
11tags:
12    - attack.discovery
13    - attack.t1124
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection_time:
19        Image|endswith:
20            - '\net.exe'
21            - '\net1.exe'
22        CommandLine|contains: 'time'
23    selection_w32tm:
24        Image|endswith: '\w32tm.exe'
25        CommandLine|contains: 'tz'
26    condition: 1 of selection_*
27falsepositives:
28    - Legitimate use of the system utilities to discover system time for legitimate reason
29level: low

References

Related rules

to-top